Monday, June 05, 2006

Exploiting non-classical format string vulnerability

"I started to explore simply way to exploit this situation. And I found it! This paper simply describes my method. I'll show you some examples on REAL vulnerabilities. Will show local and remote method how to exploit non-classical format string vulnerability."

read more | digg story